Sciweavers

2421 search results - page 89 / 485
» Integrity Assurance Technique Using Determinant Approach
Sort
View
HASE
2008
IEEE
15 years 7 months ago
Formal Support for Quantitative Analysis of Residual Risks in Safety-Critical Systems
With the increasing complexity in software and electronics in safety-critical systems new challenges to lower the costs and decrease time-to-market, while preserving high assuranc...
Jonas Elmqvist, Simin Nadjm-Tehrani
110
Voted
TSE
1998
93views more  TSE 1998»
15 years 9 days ago
A Strategy for Improving Safety Related Software Engineering Standards
—There are many standards which are relevant for building safety or mission critical software systems. An effective standard is one that should help developers, assessors, and us...
Norman E. Fenton, Martin Neil
90
Voted
TSD
2010
Springer
14 years 10 months ago
Automatic Detection and Evaluation of Edentulous Speakers with Insufficient Dentures
Abstract. Dental rehabilitation by complete dentures is a state-of-the-art approach to improve functional aspects of the oral cavity of edentulous patients. It is important to assu...
Tobias Bocklet, Florian Hönig, Tino Haderlein...
CCGRID
2003
IEEE
15 years 6 months ago
An Overlay-Network Approach for Distributed Access to SRS
SRS is a widely used system for integrating biological databases. Currently, SRS relies only on locally provided copies of these databases. In this paper we propose a mechanism th...
Thomas Fuhrmann, Andrea Schafferhans, Thure Etzol
120
Voted
SIGCSE
2010
ACM
181views Education» more  SIGCSE 2010»
15 years 7 months ago
Teaching the principles of the hacker curriculum to undergraduates
The “Hacker Curriculum” exists as a mostly undocumented set of principles and methods for learning about information security. Hacking, in our view, is defined by the ability...
Sergey Bratus, Anna Shubina, Michael E. Locasto